An Active Defense Models Based on Trust Evaluation of Heterogeneous Wireless Networks

2012 ◽  
Vol 263-266 ◽  
pp. 3012-3016
Author(s):  
Yuan Yuan Zhang ◽  
Chuang Bai Xiao ◽  
Jian Wang

Under the circumstance of heterogeneous wireless network, the new characteristic of heterogeneous wireless network makes great challenge to the network security. In this paper, we proposed the active defense model based on trust evaluation, introduced sensitive factors and assigned the weight to reflect the trust, through aggregation method, detect the feedback (or recommendation), select the related information, make the model can be dynamic and objective to network status. The simulation result shows that, the proposed model function well, compared with the good and malicious behavior environment.

2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Faisal Kaleem ◽  
Abolfazl Mehbodniya ◽  
Kang K. Yen ◽  
Fumiyuki Adachi

A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs) in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC) principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs) between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE) scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.


2011 ◽  
Vol 403-408 ◽  
pp. 1728-1731
Author(s):  
Li Cheng Liu ◽  
Lu Guo Hao ◽  
Rui Hu

Focusing on the wireless relay in heterogeneous wireless networks, a new signal processing architecture of a wireless relay has been proposed. And with an example of the heterogeneous wireless network consisted of GSM and CDMA systems, the detailed design is illustrated. The instance of the wireless relay demonstrates the feasibility of the proposed signal processing architecture.


Author(s):  
Satya Ranjan Biswal ◽  
Santosh Kumar Swain

: Security is one of the important concern in both types of the network. The network may be wired or wireless. In case of wireless network security provisioning is more difficult in comparison to wired network. Wireless Sensor Network (WSN) is also a type of wireless network. And due to resource constraints WSN is vulnerable against malware attacks. Initially, the malware (virus, worm, malicious code, etc.) targets a single node of WSN for attack. When a node of WSN gets infected then automatically start to spread in the network. If nodes are strongly correlated the malware spreads quickly in the network. On the other hand, if nodes are weakly correlated the speed of malware spread is slow. A mathematical model is proposed for the study of malware propagation dynamics in WSN with combination of spatial correlation and epidemic theory. This model is based on epidemic theory with spatial correlation. The proposed model is Susceptible-Exposed-Infectious-Recover-Dead (SEIRD) with spatial correlation. We deduced the expression of basic reproduction number. It helps in the study of malware propagation dynamics in WSN. The stability analysis of the network has been investigated through proposed model. This model also helps in reduction of redundant information and saving of sensor nodes’ energy in WSN. The theoretical investigation verified by simulation results. A spatial correlation based epidemic model has been formulated for the study of dynamic behaviour of malware attacks in WSN.


Sign in / Sign up

Export Citation Format

Share Document